Lansheng Han
Orcid: 0000-0001-7529-729X
According to our database1,
Lansheng Han
authored at least 76 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection.
IEEE Trans. Software Eng., October, 2024
Space Decoupled Prototype Learning for Few-Shot Attack Detection in Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, October, 2024
DCDroid: An APK Static Identification Method Based on Naïve Bayes Classifier and Dual-Centrality Analysis.
IET Inf. Secur., 2024
CLNX: Bridging Code and Natural Language for C/C++ Vulnerability-Contributing Commits Identification.
CoRR, 2024
Research and application of artificial intelligence based webshell detection model: A literature review.
CoRR, 2024
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems.
CoRR, 2024
Research and application of Transformer based anomaly detection model: A literature review.
CoRR, 2024
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples.
CoRR, 2024
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network.
Comput. Secur., 2024
Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
2023
BTAD: A binary transformer deep neural network model for anomaly detection in multivariate time series data.
Adv. Eng. Informatics, April, 2023
Few-shot Detection of Anomalies in Industrial Cyber-Physical System via Prototypical Network and Contrastive Learning.
CoRR, 2023
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs.
Comput. Secur., 2023
Traceable Ring Signature Scheme in Internet of Vehicles Based on Lattice Cryptography.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.
Veh. Commun., 2022
CVDF DYNAMIC - A Dynamic Fuzzy Testing Sample Generation Framework Based on BI-LSTM and Genetic Algorithm.
Sensors, 2022
WebCrack: Dynamic Dictionary Adjustment for Web Weak Password Detection based on Blasting Response Event Discrimination.
CoRR, 2022
IFAttn: Binary code similarity analysis based on interpretable features with attention.
Comput. Secur., 2022
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detection.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Mob. Networks Appl., 2021
J. Inf. Secur. Appl., 2021
Trans. Emerg. Telecommun. Technol., 2021
Security of multimedia communication with game trick based fast, efficient, and robust color-/gray-scale image encryption algorithm.
Trans. Emerg. Telecommun. Technol., 2021
2020
Comput. Secur., 2020
Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.
Comput. Networks, 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
A New Hybrid Image Encryption Algorithm Based on 2D-CA, FSM-DNA Rule Generator, and FSBI.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 3rd International Conference on High Performance Compilation, 2019
2018
Future Gener. Comput. Syst., 2018
2017
基于博弈的无线传感器网络入侵检测模型 (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory).
计算机科学, 2017
Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
计算机科学, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Mobile Web and Intelligent Information Systems, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Proceedings of the International Conference on Computer, 2014
2013
Secur. Commun. Networks, 2013
Cryptanalysis and improvement of a certificateless threshold signature secure in the standard model.
Inf. Sci., 2013
Int. J. Distributed Sens. Networks, 2013
EURASIP J. Wirel. Commun. Netw., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
J. Networks, 2012
2011
J. Parallel Distributed Comput., 2011
2010
A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
2009
J. Digit. Content Technol. its Appl., 2009
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2007
The Epidemic Threshold of a More General Epidemic Spreading Model for Network Viruses.
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Fuzzy Information and Engineering, 2007
2006
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Proceedings of the Advances in Natural Computation, First International Conference, 2005